Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23-10-2024 23:27

General

  • Target

    98cc23413643687bdbde05711e7a15b557db096668d34d662d1b9c4f2fea4243.exe

  • Size

    2.3MB

  • MD5

    a7997c11504545455fe1961f22f0dc9b

  • SHA1

    81319019760243ea119966bdde1a9afae01009cc

  • SHA256

    98cc23413643687bdbde05711e7a15b557db096668d34d662d1b9c4f2fea4243

  • SHA512

    be089fff0dc8300356f57d8504c849b333974501b2bb00786030ecdb1a548a9d31e77d687feaa223ee23c2ddd0b1be6f4136c6934c622db69c5a278f9b8137d1

  • SSDEEP

    24576:x1r43sfARB7U4kieI1SqjEDKcSrJIvJiu/AxWtV:Pr43o67TrXIqjbcS6vJT6WtV

Malware Config

Extracted

Family

babylonrat

C2

doddyfire.dyndns.org

doddyfire.linkpc.net

Signatures

  • Babylon RAT

    Babylon RAT is remote access trojan written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98cc23413643687bdbde05711e7a15b557db096668d34d662d1b9c4f2fea4243.exe
    "C:\Users\Admin\AppData\Local\Temp\98cc23413643687bdbde05711e7a15b557db096668d34d662d1b9c4f2fea4243.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe
      "C:\Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1392
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    834B

    MD5

    543ff9c4bb3fd6f4d35c0a80ba5533fc

    SHA1

    e318b6209faeffe8cde2dba71f226d2b161729af

    SHA256

    40c04d540c3d7d80564f34af3a512036bdd8e17b4ca74ba3b7e45d6d93466bcd

    SHA512

    6257994ac1ec8b99edcf0d666838a9874031a500adac9383d9b4242edc6c6ffec48f230740d443c1088aa911a36de26e7ce3b97313e3d36b00aede5352a8cf5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9A19ADAD9D098E039450ABBEDD5616EB_EB45958463869A839B2E6A0ABE8A149F

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A89DFCC31C360BA5CBD616749B1B1C5D

    Filesize

    74KB

    MD5

    06b6453df3c6706ec4ed82bc5927a3e0

    SHA1

    e5e6acce83edea5c2451ec6366d216d6eba5ed32

    SHA256

    16e8306d4ab5e498e7da77c1f03cf49d7b96cfee19f877a252ca0ceed041d660

    SHA512

    d8968efcc13fde7c143dfd644dcb555d7b46800a947ff4d57803e620b8b9c59a5b42292cf65e49aeee1cc0514204295ce7833d2a5f175a6564ca2aaffa19829b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6

    Filesize

    404B

    MD5

    4e698b169758a9433b8c324c2ffc4fd3

    SHA1

    875fa50c993ebe3ae95c67047ec039ea7f8f68fa

    SHA256

    98c6d76d251ee8f04f97da3e7fb39ebb44ad9c349bf7bb967790586ecbda5cd2

    SHA512

    cfe6cf18356912bc854071be58eb164f919592d16b800d32a6e0db2e2889b444301231ef79b70bd1e8091d6efbe3d37270310b274ec02989b279e017dd2befe0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    188B

    MD5

    5fc7cf7cd3fc34fe6033a2bbe78207fc

    SHA1

    82bc89122e7cdb28fe9d19e688ba9663411b0093

    SHA256

    9521bcde3671fab14976c3043c0c6a5f97cd4a925aff4213d18d9aa22fc9fcfa

    SHA512

    0078aff31d8b34fff9d1d333068356c20624fe0b0b691b51f1d113744ffbb65ffe80ae49757dabd509f16eb3fac67a8aebf168480933767b276ed50b0db3e54f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f87ce55cafd2cc67cbc238ba65563882

    SHA1

    6cd25a71fb2f52bb1e9a7f94d4fe8a535124579a

    SHA256

    6f28d4c9d129ffd76696c6a424a9d249d859b0f813c3afe7cb7721c6e7b52810

    SHA512

    7be9f2a9569fc6e1e63563cf4ebbec09443c71dd133eaedba9731655e60b913eceb9daf21824286811b524ce2518d28f955660e83657b212a1af34e1f2e4b07b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea63a8cfb5818ad5b1af477afbbf21f3

    SHA1

    12dfd16e91ca7bdf3f2f554f51410036807bf137

    SHA256

    e934ced3babe9fb0d0b23e485e5e873620b96ced4a3889fdf7c4f73afc47df5d

    SHA512

    0b35bfe4e80006434f90b7706bce02a130d936bd4736996f7660e3fb20158207294a08e35ff6cfabc8e6364191cb7eaa15592ad15186d51ba491d57ae31affb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9A19ADAD9D098E039450ABBEDD5616EB_EB45958463869A839B2E6A0ABE8A149F

    Filesize

    394B

    MD5

    1731a2baca6f76b90b04c3d453feef8f

    SHA1

    0dbfd8e53f3b26e7a4df029ec703221251335076

    SHA256

    70402f33b5b1efcf2e50fb9a5d96e3776225c9b2d87bdd255a5c86b5f950c6c7

    SHA512

    4b4b6d1c5c19c2a4b358d16cac393348d825a1f7e7ba504c82b3ca2ffb1f1517c9112dbad38aa728a59d5c3f0fb359744623ddf3d167c60fec78cd4fa6649663

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A89DFCC31C360BA5CBD616749B1B1C5D

    Filesize

    170B

    MD5

    1651da1419caa6dc236a80b35954b9c5

    SHA1

    e93e56573c948ac3b8a55bb15ae69f635a887b72

    SHA256

    001bf29834aff0f6c35846a41a393217d63d31403dac0e77ff71041c9b3f9bd6

    SHA512

    c12c63c55d1a95940a84a614fe6f265fe6d7a7c937f45b20afc753ea2e97eccab5df2a24d05af3b93b3bc949655224d7e8624f6f836f2777600ac0f60f9971a4

  • C:\Users\Admin\AppData\Local\Temp\Cab8336.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar83A6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\ProcessorDistrict\ComputerBalance.exe

    Filesize

    2.3MB

    MD5

    898329e50c6c745fc1b42b09bb8a33a0

    SHA1

    4704efe2e3bbdab8cbd744e21bf39e4acc2465d3

    SHA256

    ac9fdd80f4e7c11e4b697136a26483b63fe3492a312dbb7deb9dca5fea8ca7fb

    SHA512

    b2f44982f47b192c46082c480a7375348b6ab074b6584fed394cf8b71e6a68e1a214f8ee7e6fd40459b77f3762be709a10e2ea4069acb18829bfccc0853d6e39

  • memory/1372-180-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1372-182-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1372-183-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1372-184-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1372-186-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1372-188-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/1392-177-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1392-122-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1392-178-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1392-179-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1392-181-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1392-121-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1392-120-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2856-166-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2856-0-0x0000000074C01000-0x0000000074C02000-memory.dmp

    Filesize

    4KB

  • memory/2856-108-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2856-107-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2856-2-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2856-1-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB